General

  • Target

    744_22022021.doc

  • Size

    228KB

  • Sample

    210223-rj9rg9wmds

  • MD5

    849ca119321706df998263be7803700d

  • SHA1

    6fa120f7590eaf51a92379c4fbabcb0028a1db00

  • SHA256

    4b467537059ef742a71a20ac4ccf65fc68ba223a760915cac95cc23dde1b8486

  • SHA512

    3c283044358b0959693ff10b9bb566e77e0284010063b768182c7e34ac2e52fba7149767d986a2f7fb9adcf181a98687af93e2a6d914b5bea7ce6ae250e32bef

Score
8/10

Malware Config

Targets

    • Target

      744_22022021.doc

    • Size

      228KB

    • MD5

      849ca119321706df998263be7803700d

    • SHA1

      6fa120f7590eaf51a92379c4fbabcb0028a1db00

    • SHA256

      4b467537059ef742a71a20ac4ccf65fc68ba223a760915cac95cc23dde1b8486

    • SHA512

      3c283044358b0959693ff10b9bb566e77e0284010063b768182c7e34ac2e52fba7149767d986a2f7fb9adcf181a98687af93e2a6d914b5bea7ce6ae250e32bef

    Score
    8/10
    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks